-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: tigervnc security, bug fix, and enhancement update
Advisory ID:       RHSA-2021:1783-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:1783
Issue date:        2021-05-18
CVE Names:         CVE-2020-26117 
====================================================================
1. Summary:

An update for tigervnc is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64

3. Description:

Virtual Network Computing (VNC) is a remote display system which allows
users to view a computing desktop environment not only on the machine where
it is running, but from anywhere on the Internet and from a wide variety of
machine architectures. TigerVNC is a suite of VNC servers and clients.

The following packages have been upgraded to a later upstream version:
tigervnc (1.11.0). (BZ#1880985)

Security Fix(es):

* tigervnc: certificate exceptions stored as authorities (CVE-2020-26117)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.4 Release Notes linked from the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1841537 - StandardError doesn't work with Xvnc as socket activated service
1853608 - Fail to start tigervnc server
1880985 - Rebase tigervnc to 1.11.0
1882841 - CVE-2020-26117 tigervnc: certificate exceptions stored as authorities
1883415 - Tigervnc cannot use boolean values in config files
1897498 - Starting the xvnc service starts a vncsession process and goes into zombie state
1897504 - Add vncserver wrapper script again to allow non-root users to start and stop the service

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
tigervnc-1.11.0-6.el8.src.rpm

aarch64:
tigervnc-1.11.0-6.el8.aarch64.rpm
tigervnc-debuginfo-1.11.0-6.el8.aarch64.rpm
tigervnc-debugsource-1.11.0-6.el8.aarch64.rpm
tigervnc-server-1.11.0-6.el8.aarch64.rpm
tigervnc-server-debuginfo-1.11.0-6.el8.aarch64.rpm
tigervnc-server-minimal-1.11.0-6.el8.aarch64.rpm
tigervnc-server-minimal-debuginfo-1.11.0-6.el8.aarch64.rpm
tigervnc-server-module-1.11.0-6.el8.aarch64.rpm
tigervnc-server-module-debuginfo-1.11.0-6.el8.aarch64.rpm

noarch:
tigervnc-icons-1.11.0-6.el8.noarch.rpm
tigervnc-license-1.11.0-6.el8.noarch.rpm
tigervnc-selinux-1.11.0-6.el8.noarch.rpm

ppc64le:
tigervnc-1.11.0-6.el8.ppc64le.rpm
tigervnc-debuginfo-1.11.0-6.el8.ppc64le.rpm
tigervnc-debugsource-1.11.0-6.el8.ppc64le.rpm
tigervnc-server-1.11.0-6.el8.ppc64le.rpm
tigervnc-server-debuginfo-1.11.0-6.el8.ppc64le.rpm
tigervnc-server-minimal-1.11.0-6.el8.ppc64le.rpm
tigervnc-server-minimal-debuginfo-1.11.0-6.el8.ppc64le.rpm
tigervnc-server-module-1.11.0-6.el8.ppc64le.rpm
tigervnc-server-module-debuginfo-1.11.0-6.el8.ppc64le.rpm

s390x:
tigervnc-1.11.0-6.el8.s390x.rpm
tigervnc-debuginfo-1.11.0-6.el8.s390x.rpm
tigervnc-debugsource-1.11.0-6.el8.s390x.rpm
tigervnc-server-1.11.0-6.el8.s390x.rpm
tigervnc-server-debuginfo-1.11.0-6.el8.s390x.rpm
tigervnc-server-minimal-1.11.0-6.el8.s390x.rpm
tigervnc-server-minimal-debuginfo-1.11.0-6.el8.s390x.rpm
tigervnc-server-module-1.11.0-6.el8.s390x.rpm
tigervnc-server-module-debuginfo-1.11.0-6.el8.s390x.rpm

x86_64:
tigervnc-1.11.0-6.el8.x86_64.rpm
tigervnc-debuginfo-1.11.0-6.el8.x86_64.rpm
tigervnc-debugsource-1.11.0-6.el8.x86_64.rpm
tigervnc-server-1.11.0-6.el8.x86_64.rpm
tigervnc-server-debuginfo-1.11.0-6.el8.x86_64.rpm
tigervnc-server-minimal-1.11.0-6.el8.x86_64.rpm
tigervnc-server-minimal-debuginfo-1.11.0-6.el8.x86_64.rpm
tigervnc-server-module-1.11.0-6.el8.x86_64.rpm
tigervnc-server-module-debuginfo-1.11.0-6.el8.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-26117
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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a6qi
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-1783:01 Moderate: tigervnc security, bug fix,

An update for tigervnc is now available for Red Hat Enterprise Linux 8

Summary

Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
The following packages have been upgraded to a later upstream version: tigervnc (1.11.0). (BZ#1880985)
Security Fix(es):
* tigervnc: certificate exceptions stored as authorities (CVE-2020-26117)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2020-26117 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/

Package List

Red Hat Enterprise Linux AppStream (v. 8):
Source: tigervnc-1.11.0-6.el8.src.rpm
aarch64: tigervnc-1.11.0-6.el8.aarch64.rpm tigervnc-debuginfo-1.11.0-6.el8.aarch64.rpm tigervnc-debugsource-1.11.0-6.el8.aarch64.rpm tigervnc-server-1.11.0-6.el8.aarch64.rpm tigervnc-server-debuginfo-1.11.0-6.el8.aarch64.rpm tigervnc-server-minimal-1.11.0-6.el8.aarch64.rpm tigervnc-server-minimal-debuginfo-1.11.0-6.el8.aarch64.rpm tigervnc-server-module-1.11.0-6.el8.aarch64.rpm tigervnc-server-module-debuginfo-1.11.0-6.el8.aarch64.rpm
noarch: tigervnc-icons-1.11.0-6.el8.noarch.rpm tigervnc-license-1.11.0-6.el8.noarch.rpm tigervnc-selinux-1.11.0-6.el8.noarch.rpm
ppc64le: tigervnc-1.11.0-6.el8.ppc64le.rpm tigervnc-debuginfo-1.11.0-6.el8.ppc64le.rpm tigervnc-debugsource-1.11.0-6.el8.ppc64le.rpm tigervnc-server-1.11.0-6.el8.ppc64le.rpm tigervnc-server-debuginfo-1.11.0-6.el8.ppc64le.rpm tigervnc-server-minimal-1.11.0-6.el8.ppc64le.rpm tigervnc-server-minimal-debuginfo-1.11.0-6.el8.ppc64le.rpm tigervnc-server-module-1.11.0-6.el8.ppc64le.rpm tigervnc-server-module-debuginfo-1.11.0-6.el8.ppc64le.rpm
s390x: tigervnc-1.11.0-6.el8.s390x.rpm tigervnc-debuginfo-1.11.0-6.el8.s390x.rpm tigervnc-debugsource-1.11.0-6.el8.s390x.rpm tigervnc-server-1.11.0-6.el8.s390x.rpm tigervnc-server-debuginfo-1.11.0-6.el8.s390x.rpm tigervnc-server-minimal-1.11.0-6.el8.s390x.rpm tigervnc-server-minimal-debuginfo-1.11.0-6.el8.s390x.rpm tigervnc-server-module-1.11.0-6.el8.s390x.rpm tigervnc-server-module-debuginfo-1.11.0-6.el8.s390x.rpm
x86_64: tigervnc-1.11.0-6.el8.x86_64.rpm tigervnc-debuginfo-1.11.0-6.el8.x86_64.rpm tigervnc-debugsource-1.11.0-6.el8.x86_64.rpm tigervnc-server-1.11.0-6.el8.x86_64.rpm tigervnc-server-debuginfo-1.11.0-6.el8.x86_64.rpm tigervnc-server-minimal-1.11.0-6.el8.x86_64.rpm tigervnc-server-minimal-debuginfo-1.11.0-6.el8.x86_64.rpm tigervnc-server-module-1.11.0-6.el8.x86_64.rpm tigervnc-server-module-debuginfo-1.11.0-6.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2021:1783-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2021:1783
Issued Date: : 2021-05-18
CVE Names: CVE-2020-26117

Topic

An update for tigervnc is now available for Red Hat Enterprise Linux 8.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64


Bugs Fixed

1841537 - StandardError doesn't work with Xvnc as socket activated service

1853608 - Fail to start tigervnc server

1880985 - Rebase tigervnc to 1.11.0

1882841 - CVE-2020-26117 tigervnc: certificate exceptions stored as authorities

1883415 - Tigervnc cannot use boolean values in config files

1897498 - Starting the xvnc service starts a vncsession process and goes into zombie state

1897504 - Add vncserver wrapper script again to allow non-root users to start and stop the service


Related News